Search Results

There are 7568 results for: content related to: Efficient group-based authentication protocol for location-based service discovery in intelligent transportation systems

  1. Single batch machine scheduling with deliveries

    Naval Research Logistics (NRL)

    Volume 62, Issue 6, September 2015, Pages: 470–482, B.-Y. Cheng, J.Y.-T. Leung, K. Li and S.-L. Yang

    Version of Record online : 26 AUG 2015, DOI: 10.1002/nav.21641

  2. Bounds for algebraic gossip on graphs

    Random Structures & Algorithms

    Volume 45, Issue 2, September 2014, Pages: 185–217, Michael Borokhovich, Chen Avin and Zvi Lotker

    Version of Record online : 27 DEC 2012, DOI: 10.1002/rsa.20480

  3. Data privacy breach prevention framework for the cloud service

    Security and Communication Networks

    Volume 8, Issue 6, April 2015, Pages: 982–1005, Chandramohan Dhasarathan, Vengattaraman Thirumal and Dhavachelvan Ponnurangam

    Version of Record online : 15 JUN 2014, DOI: 10.1002/sec.1054

  4. Service Channel Choice for Supply Chain: Who is Better Off by Undertaking the Service?

    Production and Operations Management

    Volume 25, Issue 3, March 2016, Pages: 516–534, Xiang Li, Yongjian Li, Xiaoqiang Cai and Jun Shan

    Version of Record online : 4 JUN 2015, DOI: 10.1111/poms.12392

  5. Analyzing the Integration of WiMAX and Wi-Fi Services: Bandwidth Sharing and Channel Collaboration

    Decision Sciences

    Volume 44, Issue 6, December 2013, Pages: 1059–1090, Yung-Ming Li and Jhih-Hua Jhang-Li

    Version of Record online : 23 DEC 2013, DOI: 10.1111/deci.12050

  6. Jackson Networks (Open and Closed)

    Standard Article

    Wiley Encyclopedia of Operations Research and Management Science

    Hans Daduna

    Published Online : 15 FEB 2011, DOI: 10.1002/9780470400531.eorms0439

  7. A correlation context-aware approach for composite service selection

    Concurrency and Computation: Practice and Experience

    Volume 25, Issue 13, 10 September 2013, Pages: 1909–1927, Mingwei Zhang, Chengfei Liu, Jian Yu, Zhiliang Zhu and Bin Zhang

    Version of Record online : 15 FEB 2013, DOI: 10.1002/cpe.2988

  8. Capacity Sharing and Cost Allocation among Independent Firms with Congestion

    Production and Operations Management

    Volume 24, Issue 8, August 2015, Pages: 1285–1310, Yimin Yu, Saif Benjaafar and Yigal Gerchak

    Version of Record online : 26 JAN 2015, DOI: 10.1111/poms.12322

  9. A QoS-aware service discovery method for elastic cloud computing in an unstructured peer-to-peer network

    Concurrency and Computation: Practice and Experience

    Volume 25, Issue 13, 10 September 2013, Pages: 1843–1860, Wenmin Lin, Wanchun Dou, Zhanyang Xu and Jinjun Chen

    Version of Record online : 19 FEB 2013, DOI: 10.1002/cpe.2993

  10. Service-based high-speed railway base station arrangement

    Wireless Communications and Mobile Computing

    Volume 15, Issue 13, September 2015, Pages: 1681–1694, Chuang Zhang, Pingyi Fan, Yunquan Dong and Ke Xiong

    Version of Record online : 25 NOV 2013, DOI: 10.1002/wcm.2452

  11. An MX/G/1 queueing system with disasters and repairs under a multiple adapted vacation policy

    Naval Research Logistics (NRL)

    Volume 62, Issue 3, April 2015, Pages: 171–189, George C. Mytalas and Michael A. Zazanis

    Version of Record online : 28 MAR 2015, DOI: 10.1002/nav.21621

  12. Impossibility of finding any third family of server protocols integrating Byzantine quorum systems with threshold signature schemes

    Security and Communication Networks

    Volume 6, Issue 5, May 2013, Pages: 612–630, Jingqiang Lin, Peng Liu, Jiwu Jing and Qiongxiao Wang

    Version of Record online : 13 NOV 2012, DOI: 10.1002/sec.593

  13. Modeling and verification of trust and reputation systems

    Security and Communication Networks

    Volume 8, Issue 16, 10 November 2015, Pages: 2933–2946, Alessandro Aldini

    Version of Record online : 16 FEB 2015, DOI: 10.1002/sec.1220

  14. Incomplete service and split deliveries in a routing problem with profits

    Networks

    Volume 63, Issue 2, March 2014, Pages: 135–145, Claudia Archetti, Nicola Bianchessi, M. Grazia Speranza and Alain Hertz

    Version of Record online : 3 OCT 2013, DOI: 10.1002/net.21529

  15. Privacy-preserving authorization method for mashups

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4421–4435, Danfeng Yan, Yuan Tian and Fangchun Yang

    Version of Record online : 11 AUG 2015, DOI: 10.1002/sec.1322

  16. Service selection and horizontal multi-sourcing in process-oriented capability outsourcing

    Journal of Software: Evolution and Process

    Volume 24, Issue 3, April 2012, Pages: 259–283, Roland Ukor and Andy Carpenter

    Version of Record online : 9 DEC 2011, DOI: 10.1002/smr.557

  17. Context-aware usage control for web of things

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2696–2712, Guangdong Bai, Lin Yan, Liang Gu, Yao Guo and Xiangqun Chen

    Version of Record online : 15 FEB 2012, DOI: 10.1002/sec.424

  18. Strategic Debt Service

    The Journal of Finance

    Volume 52, Issue 2, June 1997, Pages: 531–556, PIERRE MELLA-BARRAL and WILLIAM PERRAUDIN

    Version of Record online : 18 APR 2012, DOI: 10.1111/j.1540-6261.1997.tb04812.x

  19. Privacy preserving protocol for service aggregation in cloud computing

    Software: Practice and Experience

    Volume 42, Issue 4, April 2012, Pages: 467–483, Peishun Wang, Yi Mu, Willy Susilo and Jun Yan

    Version of Record online : 18 OCT 2011, DOI: 10.1002/spe.1129

  20. State-expansion-based techniques for synthesizing concurrent protocol specifications in distributed systems

    International Journal of Communication Systems

    Volume 26, Issue 9, September 2013, Pages: 1176–1195, Jehad Al Dallal and Kassem Saleh

    Version of Record online : 9 JAN 2012, DOI: 10.1002/dac.1389